In computing IOC stands for indicator of compromise. These indicators can be found after a system intrusion and tell the investigators something about the sort of attack or security breach. These indicators can be IP addresses, domains, hashes of malware files, virus signatures, and similar artifacts. They can lead the investigators to the vulnerabilities that may have been used, possible prevention methods, and sometimes even help in attribution.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language